2 results (0.002 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

An arbitrary file write vulnerability in Jenkins Pipeline Utility Steps Plugin 2.15.2 and earlier allows attackers able to provide crafted archives as parameters to create or replace arbitrary files on the agent file system with attacker-specified content. A flaw was found in the Jenkins Pipeline Utility Steps Plugin. This flaw allows a remote, authenticated attacker to traverse directories on the system, caused by improper archive file validation. The attacker can use a specially crafted archive file containing "dot dot" sequences (/../) to create or replace arbitrary files on the agent file system with attacker-specified content. • https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2196 https://access.redhat.com/security/cve/CVE-2023-32981 https://bugzilla.redhat.com/show_bug.cgi?id=2207835 • CWE-787: Out-of-bounds Write •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 0

Jenkins Pipeline Utility Steps Plugin 2.13.1 and earlier does not restrict the set of enabled prefix interpolators and bundles versions of Apache Commons Configuration library that enable the 'file:' prefix interpolator by default, allowing attackers able to configure Pipelines to read arbitrary files from the Jenkins controller file system. Jenkins Pipeline Utility Steps Plugin 2.13.1 y versiones anteriores no restringe el conjunto de interpoladores de prefijos habilitados y las versiones de paquetes de la librería de configuración Apache Commons que habilitan el interpolador de prefijos 'file:' de forma predeterminada, lo que permite a los atacantes capaces de configurar Pipelines para leer archivos arbitrarios de el sistema de archivos del controlador Jenkins. A flaw was found in the Pipeline Utility Steps Jenkins Plugin. The affected version of the Pipeline Utility Steps Plugin does not restrict the set of enabled prefix interpolators and bundles versions of this library that enable the file: prefix interpolator by default. This flaw allows attackers who can configure Pipelines to read arbitrary files from the Jenkins controller file system. • http://www.openwall.com/lists/oss-security/2022/11/15/4 https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2949 https://access.redhat.com/security/cve/CVE-2022-45381 https://bugzilla.redhat.com/show_bug.cgi?id=2143089 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •